Data Leakage/Misuse Scenarios

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.

Original languageEnglish
Title of host publicationSpringerBriefs in Computer Science
Place of PublicationBoston, MA
PublisherSpringer
Pages39-46
Number of pages8
ISBN (Electronic)978-1-4614-2053-8
ISBN (Print)978-1-4614-2052-1
DOIs
StatePublished - 1 Jan 2012

Publication series

NameSpringerBriefs in Computer Science
Number9781461420521
Volume0
ISSN (Print)2191-5768
ISSN (Electronic)2191-5776

Keywords

  • Leak Incidence
  • Honeypot
  • Unintentional Cases
  • Third-party Location
  • Unintentional Leakage

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Data Leakage/Misuse Scenarios'. Together they form a unique fingerprint.

Cite this